SlideShare une entreprise Scribd logo
1  sur  35
- Reddhi Sekhar Basu(559)

PROGRAM AND SYSTEM THREATS
Trojan Horse
 A Trojan horse is a code segment that misuses
its environment.
 A Trojan, is a type of malware that
masquerades as a legitimate file or helpful
program possibly with the purpose of granting a
hacker unauthorized access to a computer.
 According to a survey conducted by
BitDefender from January to June 2009,
"Trojan-type malware is on the rise, accounting
for 83-percent of the global malware detected
in the world."
Trojan Horse
• Long search paths, such as are
common on UNIX systems,
exacerbate the Trojan horse
problem. For instance, the use of
“.” character in a search path, tells
the shell to include the current
directory in the search. So, if an
user A has “.” in his search path,
has set his current directory to
user B’s directory, and enters a
normal system command, the
command would be executed from
user B’s directory instead. The
program would run on user B’s
domain, allowing the program to
do anything that the user is
allowed to do, including deleting
files.
Popular Trojan Horses
• Netbus
• Subseven or Sub7
• Y3K Remote
Administration Tool
• Back Orifice
• Beast
• Zeus
• The Blachhole Exploit Kit
• Flashback Trojan
Login Emulator
An unsuspecting user logs in at a
terminal and notices that he has
apparently mistyped his password.
He tries again and is successful.
What has happened is that his
authentication key and password
have been stolen by the login
emulator that was left running on
the terminal by the thief. The
emulator stored away the password,
printed out a login error message,
and exited; the user was then
provided with a genuine login
prompt.
A Trojan may give a hacker remote access to a targeted
computer system. Operations that could be performed by
a hacker on a targeted computer system may include:
– Use of the machine as part of a botnet (e.g. to perform
automated spamming or to distribute Denial-of-Service
attacks)
– Electronic Money theft
– Data Theft(e.g. retrieving passwords or credit card
information)
– Installation of software, including third-party malware
– Downloading or uploading of files on the user's computer
– Modification deletion of files
– Crashing the Computer
– Anonymizing Internet Viewing
Trapdoor
• Trap Door is a type of security breach where the
designer of a program or a system leaves a hole in
the software that only he is capable of using.
• A Trap Door is a secret entry point into a program
that allows someone to gain access without normal
methods of access authentication.
Example of a trapdoor
Programmers have been arrested for
embezzling from banks by including rounding
errors in heir code, and having the occasional
half cents credited to their accounts. This
account crediting can add up to a large sum of
money, considering the number of
transactions that a large bank executes.
Trapdoors
• Trapdoors can be included in the compiler as
well. The compiler could generate standard
object code as well as a trapdoor, regardless of
the source code being compiled.
• Trapdoors pose a difficult problem since to
detect them we have to analyze all the source
code for all components of a system.
Stack and Buffer Overflow
• Stack or buffer overflow is the
most common way for an attacker
outside of the system, on a
network or dial-up connection to
gain unauthorized access to the
target system. This be used by the
unauthorised user for privilege
escalation.
• Buffer overflow attacks are
especially pernicious as it can be
run within a system and travel
over allowed communications
channels. They can even bypass
the security added by firewalls.
• The attacker exploits a bug in the program. The bug can
be a simple case of poor programming, in which the
programmer neglected to code bounds checking on an
input field. In this case, the attacker sends more data
than the program was expecting. Using trial and error,
or by examination of the source code of the attacked
program if it is available, the attacker determines the
vulnerability and writes a program to do the following:
1. Overflow an input field, command line argument, of
input buffer until it writes into the stack.
2. Overwrite the current return address on the stack
with the address of the exploit code loaded in the next
step.
3. Write a simple setoff code for the next space in the
stack that includes the commands that the attacker
wishes to execute (e.g. spawn a shell)
Worm
• A worm is a process that uses the
spawn mechanism to clobber system
performance.
• The worm spawns copies of itself,
using up system resources and
perhaps locking out system use by all
other processes.
Worms Spread
 independently of human action
 usually by utilizing a security hole in a piece
of software
 by scanning a network for another machine that has
a specific security hole and copies itself to the new
machine using the security hole
Morris Worm
• Robert Tappan Morris is an
American computer scientist,
best known for creating the
Morris Worm in 1988,
considered the first
computer worm on Internet
- and subsequently
becoming the first person
convicted under Computer
Fraud and Abuse Act.
Morris Worm

Disk containing the source code for the Morris
Worm held at the Boston Museum of Science
Working of the Morris Worm
Morris Worm
 Once in place, the main program undertook systematic attempts to
discover user passwords. This happened in 3 stages:
1. Trying simple cases of no passwords or passwords
constructed of account user name combinations.
2. Using comparisons with an internal dictionary of 432
password choices.
3. Trying each word in the online UNIX dictionary
This elaborate and efficient 3-stage password cracking algorithm
enabled the worm to gain further access to other user accounts on
the infected system.
 With each new access the worm searched for already active copies
of itself. If it found one the new copy exited except for every
seventh instance.
Computer Viruses
A virus is a fragment of code embedded in a
legitimate program unlike a worm which is
structured as a complete, standalone
program.
Spread of Viruses
• Viruses are spread by users
downloading viral programs
from public bulletin boards
or exchanging disks
containing an infection.
• Exchange of Microsoft
Office documents are a
common form of virus
transmission these days
because these documents
contain so-called macros
which are Visual Basic
programs.
Classification of Viruses
NON-RESIDENT VIRUSES
• Non-resident viruses can be
thought of as consisting of a
finder module and a
replication module. The
finder module is responsible
for finding new files to
infect. For each new
executable file the finder
module encounters, it calls
the replication module to
infect that file.

RESIDENT VIRUSES
• The virus loads the
replication module into
memory when it is executed
instead and ensures that
this module is executed
each time the operating
system is called to perform
a certain operation.
Classification (contd.)
POLYMORPHIC VIRUS
• Change virus’s signature
each time.
• It’s designed to avoid
detection by antivirus
software.
• It acts like a chameleon.

STEALTH VIRUS
• It use some tactics to avoid
detection such as altering
its file size, concealing itself
in memory, and Modifies
parts of the system that can
be used to detect it.
Creeper Virus
The Creeper virus was first
detected on ARPANET. Creeper
was an experimental selfreplicating program written by
Bob
Thomas
at
BBN
Technologies in 1971. Creeper
used the ARPANET to infect
DEC
PDP-10
computers
running the TENEX operating
system. Creeper gained access
via the ARPANET and copied
itself to the remote system
where the message, "I'm the
creeper, catch me if you can!"
was displayed. The Reaper
program was created to delete
Creeper.
Michelangelo Virus
On March 6, 1992, the 517th
birthday of Michelangelo,
the Michelangelo virus was
scheduled to erase infected
hard disk files. But because
of the extensive popularity
surrounding the virus, most
sites had detected and
destroyed the virus before it
was activated, so it caused
little or no damage.
Love Bug Virus
• In 2000, the Love Bug
became very widespread. It
appeared to be a love note
sent by the friend of the
receiver. Once invoked, by
opening the Virtual Basic
script, it propagated by
sending itself to the first
users in user’s email contact
list. It just clogged user’s
inbox and email systems, but
was relatively harmless.
Protection against Viruses
• The problem of viruses can be dealt with by using
antivirus software. They work by searching all the
programs on a system for the specific pattern of
instructions known to make up a virus. When
they find a known pattern, they remove the
instructions, disinfecting the program.
• The best protection against virus is the method of
safe computing : purchasing unopened software
from vendor and avoiding free or pirated copies
from public sources or disk exchange.
Worms v/s Viruses
WORMS
 rely little or not at all on
humans to spread

VIRUSES
 dependent upon a host file

 spread across a network

 need the help of humans to
spread

 spread rapidly

 take a while to spread
Denial of Service
 Denial of service does not involve stealing of
resources or gaining information, but rather
disabling legitimate use of a system or facilty.
 It is easier than breaking into a machine.
 They are network based.
 They fall into 2 categories:
1. An attack that uses so many facility
resources that, in essence, no work can be done.

2. An attack that disrupts the network
facility of the computer.
 It is impossible to prevent Denial of Service
attacks. Frequently it is difficult to determine if a
system slowdown is due to surge in use or an attack.
ANY QUESTIONS ?

Contenu connexe

Tendances

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 

Tendances (20)

Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
System hacking
System hackingSystem hacking
System hacking
 
What is malware
What is malwareWhat is malware
What is malware
 
Botnets
BotnetsBotnets
Botnets
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Web security
Web securityWeb security
Web security
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Ransomware
RansomwareRansomware
Ransomware
 
Spyware
SpywareSpyware
Spyware
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 

En vedette

Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23
DefconRussia
 
Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11
BarrBoy
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
Steven Cahill
 
Operating system security
Operating system securityOperating system security
Operating system security
Rachel Jeewa
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

En vedette (19)

Program Threats
Program ThreatsProgram Threats
Program Threats
 
Treatment sheet
Treatment sheetTreatment sheet
Treatment sheet
 
system Security
system Security system Security
system Security
 
National parks of india
National parks of indiaNational parks of india
National parks of india
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Enabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using VirtualizationEnabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using Virtualization
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similaire à Program and System Threats

Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
richarddxd
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
Umang Gupta
 

Similaire à Program and System Threats (20)

Mitppt
MitpptMitppt
Mitppt
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Regression
RegressionRegression
Regression
 
Sangeetha Venture
Sangeetha VentureSangeetha Venture
Sangeetha Venture
 
Computer virus
Computer virusComputer virus
Computer virus
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Presentation2
Presentation2Presentation2
Presentation2
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptx
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 

Plus de Reddhi Basu (6)

Exception Handling
Exception HandlingException Handling
Exception Handling
 
Software Engineering - Software Models
Software Engineering - Software ModelsSoftware Engineering - Software Models
Software Engineering - Software Models
 
Storage Class Specifiers in C++
Storage Class Specifiers in C++Storage Class Specifiers in C++
Storage Class Specifiers in C++
 
Storage Class Specifiers
Storage Class SpecifiersStorage Class Specifiers
Storage Class Specifiers
 
Big Data
Big DataBig Data
Big Data
 
System Security
System SecuritySystem Security
System Security
 

Dernier

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Dernier (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Program and System Threats

  • 1. - Reddhi Sekhar Basu(559) PROGRAM AND SYSTEM THREATS
  • 2.
  • 3. Trojan Horse  A Trojan horse is a code segment that misuses its environment.  A Trojan, is a type of malware that masquerades as a legitimate file or helpful program possibly with the purpose of granting a hacker unauthorized access to a computer.  According to a survey conducted by BitDefender from January to June 2009, "Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world."
  • 4. Trojan Horse • Long search paths, such as are common on UNIX systems, exacerbate the Trojan horse problem. For instance, the use of “.” character in a search path, tells the shell to include the current directory in the search. So, if an user A has “.” in his search path, has set his current directory to user B’s directory, and enters a normal system command, the command would be executed from user B’s directory instead. The program would run on user B’s domain, allowing the program to do anything that the user is allowed to do, including deleting files.
  • 5. Popular Trojan Horses • Netbus • Subseven or Sub7 • Y3K Remote Administration Tool • Back Orifice • Beast • Zeus • The Blachhole Exploit Kit • Flashback Trojan
  • 6. Login Emulator An unsuspecting user logs in at a terminal and notices that he has apparently mistyped his password. He tries again and is successful. What has happened is that his authentication key and password have been stolen by the login emulator that was left running on the terminal by the thief. The emulator stored away the password, printed out a login error message, and exited; the user was then provided with a genuine login prompt.
  • 7. A Trojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: – Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-Service attacks) – Electronic Money theft – Data Theft(e.g. retrieving passwords or credit card information) – Installation of software, including third-party malware – Downloading or uploading of files on the user's computer – Modification deletion of files – Crashing the Computer – Anonymizing Internet Viewing
  • 8.
  • 9. Trapdoor • Trap Door is a type of security breach where the designer of a program or a system leaves a hole in the software that only he is capable of using. • A Trap Door is a secret entry point into a program that allows someone to gain access without normal methods of access authentication.
  • 10. Example of a trapdoor Programmers have been arrested for embezzling from banks by including rounding errors in heir code, and having the occasional half cents credited to their accounts. This account crediting can add up to a large sum of money, considering the number of transactions that a large bank executes.
  • 11. Trapdoors • Trapdoors can be included in the compiler as well. The compiler could generate standard object code as well as a trapdoor, regardless of the source code being compiled. • Trapdoors pose a difficult problem since to detect them we have to analyze all the source code for all components of a system.
  • 12.
  • 13. Stack and Buffer Overflow • Stack or buffer overflow is the most common way for an attacker outside of the system, on a network or dial-up connection to gain unauthorized access to the target system. This be used by the unauthorised user for privilege escalation. • Buffer overflow attacks are especially pernicious as it can be run within a system and travel over allowed communications channels. They can even bypass the security added by firewalls.
  • 14. • The attacker exploits a bug in the program. The bug can be a simple case of poor programming, in which the programmer neglected to code bounds checking on an input field. In this case, the attacker sends more data than the program was expecting. Using trial and error, or by examination of the source code of the attacked program if it is available, the attacker determines the vulnerability and writes a program to do the following: 1. Overflow an input field, command line argument, of input buffer until it writes into the stack. 2. Overwrite the current return address on the stack with the address of the exploit code loaded in the next step. 3. Write a simple setoff code for the next space in the stack that includes the commands that the attacker wishes to execute (e.g. spawn a shell)
  • 15.
  • 16. Worm • A worm is a process that uses the spawn mechanism to clobber system performance. • The worm spawns copies of itself, using up system resources and perhaps locking out system use by all other processes.
  • 17. Worms Spread  independently of human action  usually by utilizing a security hole in a piece of software  by scanning a network for another machine that has a specific security hole and copies itself to the new machine using the security hole
  • 18. Morris Worm • Robert Tappan Morris is an American computer scientist, best known for creating the Morris Worm in 1988, considered the first computer worm on Internet - and subsequently becoming the first person convicted under Computer Fraud and Abuse Act.
  • 19. Morris Worm Disk containing the source code for the Morris Worm held at the Boston Museum of Science
  • 20. Working of the Morris Worm
  • 21. Morris Worm  Once in place, the main program undertook systematic attempts to discover user passwords. This happened in 3 stages: 1. Trying simple cases of no passwords or passwords constructed of account user name combinations. 2. Using comparisons with an internal dictionary of 432 password choices. 3. Trying each word in the online UNIX dictionary This elaborate and efficient 3-stage password cracking algorithm enabled the worm to gain further access to other user accounts on the infected system.  With each new access the worm searched for already active copies of itself. If it found one the new copy exited except for every seventh instance.
  • 22.
  • 23. Computer Viruses A virus is a fragment of code embedded in a legitimate program unlike a worm which is structured as a complete, standalone program.
  • 24. Spread of Viruses • Viruses are spread by users downloading viral programs from public bulletin boards or exchanging disks containing an infection. • Exchange of Microsoft Office documents are a common form of virus transmission these days because these documents contain so-called macros which are Visual Basic programs.
  • 25. Classification of Viruses NON-RESIDENT VIRUSES • Non-resident viruses can be thought of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file. RESIDENT VIRUSES • The virus loads the replication module into memory when it is executed instead and ensures that this module is executed each time the operating system is called to perform a certain operation.
  • 26. Classification (contd.) POLYMORPHIC VIRUS • Change virus’s signature each time. • It’s designed to avoid detection by antivirus software. • It acts like a chameleon. STEALTH VIRUS • It use some tactics to avoid detection such as altering its file size, concealing itself in memory, and Modifies parts of the system that can be used to detect it.
  • 27. Creeper Virus The Creeper virus was first detected on ARPANET. Creeper was an experimental selfreplicating program written by Bob Thomas at BBN Technologies in 1971. Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was created to delete Creeper.
  • 28. Michelangelo Virus On March 6, 1992, the 517th birthday of Michelangelo, the Michelangelo virus was scheduled to erase infected hard disk files. But because of the extensive popularity surrounding the virus, most sites had detected and destroyed the virus before it was activated, so it caused little or no damage.
  • 29. Love Bug Virus • In 2000, the Love Bug became very widespread. It appeared to be a love note sent by the friend of the receiver. Once invoked, by opening the Virtual Basic script, it propagated by sending itself to the first users in user’s email contact list. It just clogged user’s inbox and email systems, but was relatively harmless.
  • 30. Protection against Viruses • The problem of viruses can be dealt with by using antivirus software. They work by searching all the programs on a system for the specific pattern of instructions known to make up a virus. When they find a known pattern, they remove the instructions, disinfecting the program. • The best protection against virus is the method of safe computing : purchasing unopened software from vendor and avoiding free or pirated copies from public sources or disk exchange.
  • 31.
  • 32. Worms v/s Viruses WORMS  rely little or not at all on humans to spread VIRUSES  dependent upon a host file  spread across a network  need the help of humans to spread  spread rapidly  take a while to spread
  • 33.
  • 34. Denial of Service  Denial of service does not involve stealing of resources or gaining information, but rather disabling legitimate use of a system or facilty.  It is easier than breaking into a machine.  They are network based.  They fall into 2 categories: 1. An attack that uses so many facility resources that, in essence, no work can be done.  2. An attack that disrupts the network facility of the computer.  It is impossible to prevent Denial of Service attacks. Frequently it is difficult to determine if a system slowdown is due to surge in use or an attack.